What users should know about Full Disk Encryption based on LUKS

Size: px
Start display at page:

Download "What users should know about Full Disk Encryption based on LUKS"

Transcription

1 What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 December 17, / 34

2 Overview 1 Introduction 2 The key management process 3 Linux Unied Key Setup (LUKS) 4 Analysis of a LUKS implementation [1] 5 Conclusions BunnyTN15 andrea.visconti@unimi.it December 17, / 34

3 Problem Description Introduction Mobile devices, laptops, USB memory usually store large amounts of sensitive information frequently unprotected. If such devices are lost or stolen, the risk of unauthorized disclosure of condential, sensitive, or classied information is very high. Also operating systems store temporary les and/or swap partitions on hard drive and several problems arise when these les contain sensitive data. BunnyTN15 December 17, / 34

4 A possible solution Introduction A possible solution is to encrypt the whole hard disk: Full Disk Encryption (FDE). FDE solutions aim to provide data security, even in the event that an encrypted device is lost or stolen. All information is encrypted/decrypted on the y, automatically and transparently. Without the encryption key, the data stored on the disk remains inaccessible to any users (regular or malicious). BunnyTN15 andrea.visconti@unimi.it December 17, / 34

5 Introduction Main issue and possible solution One of the main issues facing Full Disk Encryption solutions is the password management. Indeed, the master key used to encrypt the whole disk is stored on it. A well-known solution to this problem, is to adopt a two level key hierarchy but sometimes it is not enough (e.g. two level key hierarchy adopted by Android 3-4.3). We analyze the key management process used to derive the encryption key; how the choice of specic hash functions and aggressive power management options may aect the security of a FDE solution. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

6 The key management process The key management process LUKS adopts a two level key hierarchy: A strong master key generated by the system is used to encrypt/decrypt whole hard disk; The master key is unique; Such a key is split, encrypted with a secret user key and stored on the device itself; Each user has their own secret key; Several encrypted master keys are stored on disk, one for each user. A possible solution is to adopt a KDF [2, 3]. The KDF implemented is PBKDF2 [4]. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

7 The key management process The key management process (2) DK = PBKDF 2(p, s, c, dklen) More precisely, the derived key is computed as follows: DK = T 1 T 2... T dklen/hlen Each single block T i is computed as T i = U 1 U 2... U c where U 1 = PRF (p, s i) U 2 = PRF (p, U 1 ). U c = PRF (p, U c 1) BunnyTN15 andrea.visconti@unimi.it December 17, / 34

8 The key management process The key management process (3) In order to prevent building universal dictionaries, PBKDF2 uses a salt. The KDF allows legitimate users to spend a moderate amount of time on key derivation, while inserts CPU-intensive operations on the attacker side. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

9 A LUKS partition Linux Unied Key Setup (LUKS) A LUKS partition contains information about start sector of key material; salt; iteration counts (e.g. c = 588, 761); used cipher (e.g. AES); cipher mode (e.g. XTS); key length (e.g. 256 bits); hash function (e.g. SHA-1); master key checksum;... BunnyTN15 andrea.visconti@unimi.it December 17, / 34

10 A LUKS master key Linux Unied Key Setup (LUKS) When a user key is provided, it unlocks one of the eight key slots and the following algorithm is executed: BunnyTN15 andrea.visconti@unimi.it December 17, / 34

11 Linux Unied Key Setup (LUKS) LUKS: the master key recovery process BunnyTN15 December 17, / 34

12 Our testing activities... Because salt parameter is known and user password may be guessed, we focus on iteration counts and their ability to slow down a brute force attack as much as possible. We try to understand 1 where and how the iteration counts are used; 2 how the choice of specic hash functions may aect the iteration count computation; 3 how unwitting users might signicantly reduce the security of a LUKS implementation by setting aggressive power management options. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

13 Our testing activities... 1) Where and how the iteration counts are used... BunnyTN15 December 17, / 34

14 FIRST: Iteration counts (where and how) BunnyTN15 December 17, / 34

15 FIRST: Iteration counts (where and how) (2) This table shows the average iteration count values involved in the key derivation process. BunnyTN15 December 17, / 34

16 FIRST: Iteration counts (where and how) (3) This table shows the average iteration count values involved in the master key checksum process. BunnyTN15 December 17, / 34

17 FIRST: Iteration counts (where and how) (4) A closer look: we experimentally observed that about 75-80% of the computational eort required to compute a derived key is generated by rst iteration count, while the remaining 20-25% by second one. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

18 Avoiding the master key checksum process BunnyTN15 December 17, / 34

19 Our testing activities... 2) How the choice of specic hash functions may aect the iteration count computation... BunnyTN15 December 17, / 34

20 SECOND: Iteration counts and hash functions The iteration counts are automatically computed by making some run-time tests when the encrypted partition is generated. We collected several partition headers to be sure that such values are not conditioned by external factors, e.g. running programs. More precisely, for each processor (eight) and each hash function (four), we execute 100 runs for a total of = 3200 partition headers collected. The variation across runs is observed to be less than 0.4%. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

21 SECOND: Iteration counts and hash functions (2) As expected, devices with a dierent hardware conguration generate dierent iteration count values. Surprisingly, the choice of a dierent hash function may considerably decrease the iteration count values. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

22 SECOND: Iteration counts and hash functions (3) The iteration counts related to SHA-256/512 are considerably smaller than those of SHA-1. It is easier to attack a FDE solution which makes use of a new hash function (e.g., SHA256 or SHA512) rather than one which uses an old hash function (e.g., SHA-1). This is a counter-intuitive idea! From an user's point of view, SHA-256 and SHA-512 are still considered more secure than SHA-1, therefore a FDE solution based on SHA-2 is expected to be stronger. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

23 SECOND: Iteration counts and hash functions (4) The computational time spent to compute a list of master key candidates does not only depend on the iteration count values. Even the number of ngerprints required to compute a single iteration aects the total execution time! BunnyTN15 andrea.visconti@unimi.it December 17, / 34

24 PBKDF2 Analysis of a LUKS implementation DK = PBKDF 2(p, s, c, dklen) More precisely, the derived key is computed as follows: DK = T 1 T 2... T dklen/hlen Each single block T i is computed as T i = U 1 U 2... U c where U 1 = PRF (p, s i) U 2 = PRF (p, U 1 ) U c. = PRF (p, U c 1) BunnyTN15 andrea.visconti@unimi.it December 17, / 34

25 SECOND: Iteration counts and hash functions... but a SHA-1 ngerprint is only 160 bits in length and cannot be used as derived key, hence a second ngerprint is necessary: DerKey = T 1 T 2 On the other hand, SHA-256 and SHA-512 generate enough bits to compute a derived key: DerKey = T 1 At equal iteration count values, we need to run the HMAC-SHA1 two times. Hence, a FDE solution based on HMAC-SHA1 slow down a brute force attack better than one based on HMAC-SHA256/SHA512. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

26 THIRD: Iteration counts and power management 3) How unwitting users might signicantly reduce the security of a LUKS implementation by setting aggressive power management options... BunnyTN15 andrea.visconti@unimi.it December 17, / 34

27 THIRD: Iteration counts and power management Another important feature that users have to take into account during encryption operations are the power management options. A common way to increase the battery life of devices is to enable aggressive power saving policies. Such policies save power, but they also impact performance by lowering CPU clock speed.... and the iteration count values fall down even further! BunnyTN15 andrea.visconti@unimi.it December 17, / 34

28 THIRD: Iteration counts and power management This means that power saving policies might have an important impact on the iteration count values, hence, on the strength of the FDE solution adopted. BunnyTN15 December 17, / 34

29 Testing: a toy example We implemented a brute-force attack based on a password-list of 250,000 master keys (i.e. a dictionary attack). We run our code on a laptop equipped with an i7 4710MQ processor. No GPUs have been used. We target two LUKS partitions collected using the following conguration options: default iteration count values, AES-256 XTS mode, HMAC-SHA1, laptop plugged in; default iteration count values, AES-256 XTS mode, HMAC-SHA512, laptop unplugged; BunnyTN15 andrea.visconti@unimi.it December 17, / 34

30 Testing: a toy example (2) The second approach (i.e., SHA-512 unplugged) abruptly reduce the timeframe for brute forcing, showing how the simple choice of conguration parameters may aect a FDE solution based on LUKS. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

31 Conclusions Conclusions We identify a number of issues that should be assessed and faced when a full disk encryption is implemented: The iteration count values are used to slow down a brute force attack, therefore, they should not be too small. Experimental results show that sometimes they are. The problem of EXT family le system allows attackers to substitute the master key checksum process by a simple decryption operation. The CPU-intensive operations used to compute a derived key should not be avoided by executing a set of functionally-equivalent instructions. From an user's point of view a FDE solution based on HMAC-SHA256/SHA512, is expected to be much stronger than one based on SHA-1, and be far more resistant to brute-force attacks. Our testing disprove this. BunnyTN15 andrea.visconti@unimi.it December 17, / 34

32 Conclusions (2) Conclusions Power management options should not aect the strength of a FDE solution. Testing results show that aggressive power-saving approaches may have a relevant impact on the iteration count values, hence, on the strength of the solution adopted. Master keys stored on disk are protected with user keys which should have a minimum length requirement in order to prevent a brute force attack. We experimentally observed that a number of distribution such as Debian, Ubuntu, and ArchLinux have no minimum length requirement, while Fedora has (but only eight characters)....the cryptsetup 1.7 release changes defaults for LUKS... BunnyTN15 andrea.visconti@unimi.it December 17, / 34

33 Conclusions Thanks for your attention! BunnyTN15 December 17, / 34

34 Bibliography Conclusions S. Bossi and A. Visconti, What users should know about Full Disk Encryption based on LUKS, in Proceedings of the 14th International Conference on Cryptology and Network Security, CANS15, RSA Laboratories, Pkcs #5 v2.1: Password based cryptography standard, NIST, SP : Recommendation for password-based key derivation, A. Visconti, S. Bossi, H. Ragab, and A. Caló, On the weaknesses of PBKDF2, in Proceedings of the 14th International Conference on Cryptology and Network Security, CANS15, BunnyTN15 December 17, / 34

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com Disk encryption... (not only) in Linux Milan Brož mbroz@redhat.com FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality. PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and

More information

Analysis of FileVault 2: Apple's full disk encryption. Omar Choudary Felix Grobert Joachim Metz

Analysis of FileVault 2: Apple's full disk encryption. Omar Choudary Felix Grobert Joachim Metz Analysis of FileVault 2: Apple's full disk encryption Omar Choudary Felix Grobert Joachim Metz FileVault 2 Project Overview Goal reverse engineer and analyse Apple's full disk encryption (aka File Vault)

More information

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft.

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft. Presentation on Black Hat Europe 2003 Conference Security Analysis of Microsoft Encrypting File System (EFS) Microsoft Encrypting File System Encrypting File File System System (EFS) (EFS) is is a a new

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

Protection Profile for Full Disk Encryption

Protection Profile for Full Disk Encryption Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information

Message Authentication Codes

Message Authentication Codes 2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,

More information

AD Image Encryption. Format Version 1.2

AD Image Encryption. Format Version 1.2 AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

Securing Password Storage Increasing Resistance to Brute Force Attacks

Securing Password Storage Increasing Resistance to Brute Force Attacks Securing Password Storage Increasing Resistance to Brute Force Attacks -john (Steven) Internal CTO @m1splacedsoul v0.4 Chandu Ketkar Technical Manager @cketkar Scott Matsumoto Principal Consultant @smatsumoto

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Encrypt-FS: A Versatile Cryptographic File System for Linux

Encrypt-FS: A Versatile Cryptographic File System for Linux Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique

More information

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry

More information

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider January 2015 Introduction Competition is fierce in the exploding online backup industry. With so many

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

A Secure Cloud Based File Exchange System

A Secure Cloud Based File Exchange System A Secure Cloud Based File Exchange System The planning and implementation of a system to transfer files between users with a focus on security Master of Science Thesis in Secure and Dependable Computer

More information

CCMP known-plain-text attack

CCMP known-plain-text attack Taking a different approach to attack WPA2-AES, or the born of the CCMP known-plain-text attack Domonkos P. Tomcsanyi Lukas Lueg April, 2010 Abstract

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD

Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD Cryptographic Filesystems Background and Implementations for Linux and OpenBSD Background Loop device primer Keys, cipher modes, salting, key hashing Journaling file systems and encrypted swap Offset,

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

WIBU-SYSTEMS CodeMeter a Revolutionary Digital Rights Management System

WIBU-SYSTEMS CodeMeter a Revolutionary Digital Rights Management System Contents WIBU-SYSTEMS CodeMeter a Revolutionary Digital Rights Management System White Paper and FAQ Marcellus Buchheit, VP Research & Development, WIBU-SYSTEMS AG Version 1.0 of 2003-Feb-05 1 CodeMeter

More information

PKCS #5 v2.1: Password-Based Cryptography Standard

PKCS #5 v2.1: Password-Based Cryptography Standard PKCS #5 v2.1: Password-Based Cryptography Standard Table of Contents RSA Laboratories October 27, 2012 TABLE OF CONTENTS... 1 1. INTRODUCTION... 2 2. NOTATION... 3 3. OVERVIEW... 4 4. SALT AND ITERATION

More information

Boost system security with better data-atrest

Boost system security with better data-atrest Boost system security with better data-atrest encryption Encryption techniques can be used to protect sensitive data that is on a device's hard drive (data-at-rest). By Dave Kleidermacher Chief Technology

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Protecting Data at Rest Caché Block-Level Database Encryption

Protecting Data at Rest Caché Block-Level Database Encryption Protecting Data at Rest Caché Block-Level Database Encryption David Shambroom InterSystems Corporation Revised 24 February 2006 Copyright InterSystems Corporation 2005, 2006 All rights reserved 1 Motivation

More information

YubiKey Integration for Full Disk Encryption

YubiKey Integration for Full Disk Encryption YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

IronKey Data Encryption Methods

IronKey Data Encryption Methods IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication

More information

Kaspersky Lab s Full Disk Encryption Technology

Kaspersky Lab s Full Disk Encryption Technology Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Message Authentication

Message Authentication Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Cryptography and Network Security Chapter 11

Cryptography and Network Security Chapter 11 Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each

More information

Protection Profile for Software Full Disk Encryption

Protection Profile for Software Full Disk Encryption Protection Profile for Software Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 14 February 2013 Version 1.0 Table of Contents 1 Introduction to

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

Cloudifile Getting Started

Cloudifile Getting Started Cloudifile Getting Started 1 Contents About... 3 System Requirements... 3 Cloudifile Recommendations for Use... 4 Cloudifile: How It Works?... 6 [Windows] Getting Started... 8 [Mac OS X] Getting Started...

More information

FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0) FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy

More information

Forensic Decryption of FAT BitLocker Volumes

Forensic Decryption of FAT BitLocker Volumes Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,

More information

Master of Science in Communication Technology. Co-supervisor: Carsten Maartmann-Mo, Ernst & Young

Master of Science in Communication Technology. Co-supervisor: Carsten Maartmann-Mo, Ernst & Young Cloud Storage Vault Eirik Haver Eivind Melvold Pål Ruud Master of Science in Communication Technology Submission date: June 2011 Supervisor: Danilo Gligoroski, ITEM Co-supervisor: Carsten Maartmann-Mo,

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

Password Manager with 3-Step Authentication System

Password Manager with 3-Step Authentication System Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London z.petrov@my.westminster.ac.uk, razvan.ragazan@my.westminster.ac.uk Abstract: A big

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Performance Analysis of Client Side Encryption Tools

Performance Analysis of Client Side Encryption Tools Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared

More information

Python Cryptography & Security. José Manuel Ortega @jmortegac

Python Cryptography & Security. José Manuel Ortega @jmortegac Python Cryptography & Security José Manuel Ortega @jmortegac https://speakerdeck.com/jmortega Security Conferences INDEX 1 Introduction to cryptography 2 PyCrypto and other libraries 3 Django Security

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

Waspmote Encryption Libraries. Programming guide

Waspmote Encryption Libraries. Programming guide Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7

More information

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition

More information

GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France

GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France GostCrypt User Guide Laboratoire de Cryptologie et de Virologie Opérationnelles - France Copyright c 2014 Laboratoire de Cryptologie et de Virologie Opératoinnelles - France GOSTCRYPT.ORG Contents 1 Introduction.................................................

More information

Ciphermail for Android Quick Start Guide

Ciphermail for Android Quick Start Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail for Android Quick Start Guide June 19, 2014, Rev: 5460 Copyright 2011-2014, ciphermail.com 3 CONFIGURATION WIZARD 1 Introduction This quick start guide helps you

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge omar.choudary@cl.cam.ac.uk Felix Gröbert felix@groebert.org Joachim Metz joachim.metz@gmail.com

More information

Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1

Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1 Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You

More information

Reverse engineering hardware for software reversers: studying an encrypted external HDD

Reverse engineering hardware for software reversers: studying an encrypted external HDD Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why

More information

Project: Simulated Encrypted File System (SEFS)

Project: Simulated Encrypted File System (SEFS) Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

SAS Data Set Encryption Options

SAS Data Set Encryption Options Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

File System Encryption with Integrated User Management

File System Encryption with Integrated User Management File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich fsfs@stefan-ludwig.de Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of

More information

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application.

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application. Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not

More information

Symmetric and Public-key Crypto Due April 14 2015, 11:59PM

Symmetric and Public-key Crypto Due April 14 2015, 11:59PM CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

The Security Behind Sticky Password

The Security Behind Sticky Password The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and

More information

Pulse Secure, LLC. January 9, 2015

Pulse Secure, LLC. January 9, 2015 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May

More information

Client side. DESlock + Data Encryption

Client side. DESlock + Data Encryption Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client

More information

Firmware security features in HP Compaq business notebooks

Firmware security features in HP Compaq business notebooks HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot

More information

SECURITY IN SMARTPHONES AND TABLETS

SECURITY IN SMARTPHONES AND TABLETS SECURITY IN SMARTPHONES AND TABLETS S Tausif Akram Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Odisha, India SECURITY IN SMARTPHONES AND TABLETS

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Password-based encryption in ZIP files

Password-based encryption in ZIP files Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information